Companies Home Search Profile

Cryptography

Focused View

2:29:48

0 View
  • 1 - Bifid Cipher Playfaire Homophonic Cipher.mp4
    01:51
  • 1 - Ceasar-Coding-Scrambled-Alphabet-Vigenere-Cipher.mp4
    01:38
  • 2 - Ceasar Coding Scrambled Alphabet Vigenere Cipher.mp4
    01:39
  • 3 - Morse Code Fractionated Morse Code Pig Pen Rail Code.mp4
    02:00
  • 4 - Combinations Permutations SetTheory.mp4
    01:45
  • 4 - Combinations-Permutations-Set-Theory.mp4
    01:45
  • 5 - One Time Pad Data Hexadecimal.mp4
    02:14
  • 6 - Data Integrity Reed Solomon.mp4
    00:37
  • 7 - Huffman Coding Lemep Viz Welsh.mp4
    00:55
  • 8 - Little Endian Big Endian.mp4
    00:50
  • 9 - Integers Rationale Numbers Real Numbers Prime Numbers.mp4
    00:53
  • 10 - Binary Math XOR OR And.mp4
    02:39
  • 11 - Cryptography Cryptanalysis Cryptology Cleartext Ciphertext.mp4
    00:31
  • 12 - Mod ShiftOperators Pseudo Random True Random.mp4
    01:52
  • 13 - MonoAlphabetic Polyalphabetic.mp4
    00:46
  • 14 - Enigma Machine Asymmetric Encryption Symmetric Encryption.mp4
    00:52
  • 15 - Frequency analysis.mp4
    00:22
  • 16 - DiffieHellman Perfect Forward Secrecy Elliptic Curve DiffieHellman.mp4
    02:03
  • 17 - ECB CBC CFB OFB CTR.mp4
    05:13
  • 18 - PGP Stream Block Encryption.mp4
    01:29
  • 19 - IV Substitution Transformation Diffusion.mp4
    02:10
  • 20 - Padding DES 3DES.mp4
    00:57
  • 21 - Entropy Encryption Decryption Encoding.mp4
    01:11
  • 22 - AES IDEA RC2 RC5 RC6.mp4
    02:17
  • 23 - Skipjack BlowFish TwoFish Camilla XTEA.mp4
    02:02
  • 24 - Hashing.mp4
    01:10
  • 25 - Hash collision Preimage Attack Birthday Attack.mp4
    02:15
  • 26 - Salt Bcrypt.mp4
    02:32
  • 27 - Rainbow Table HMAC APR1.mp4
    01:52
  • 28 - LDAP PHPass Cisco Hashes.mp4
    01:24
  • 29 - PBKDF2 noncryptographic hash Password Strength Cloud Cracking.mp4
    01:35
  • 30 - CBCMAC CCM Windows hashing Linux hashing.mp4
    04:41
  • 31 - CIA Triad and PKI.mp4
    00:42
  • 32 - PKCS5 7 10 12 CA Hierarchy.mp4
    02:50
  • 33 - One Two Way Authentication EndtoEnd and Intermediate Authentication Types of.mp4
    01:13
  • 34 - Cert types Digital Certificate stages states of revocation.mp4
    01:56
  • 35 - Tunnel Transport AH ESP.mp4
    03:39
  • 36 - IPSEC Phases.mp4
    00:44
  • 37 - IKE TOR.mp4
    01:30
  • 38 - key escrow anobus AES weakness.mp4
    01:00
  • 39 - Cryptocracking.mp4
    02:05
  • 40 - Lightweight cryptography.mp4
    00:32
  • 41 - Bitcoin Ethereum.mp4
    02:20
  • 42 - WEP WEPTKIP.mp4
    01:36
  • 43 - RC4 WPA WPA2 Wireless protocols.mp4
    01:46
  • 44 - ChaCha20 A5 cipher.mp4
    00:47
  • 45 - Questions 110.mp4
    10:02
  • 46 - Questions 1120.mp4
    09:45
  • 47 - Questions 2130.mp4
    09:33
  • 48 - Questions 3140.mp4
    17:03
  • 49 - Questions 4150.mp4
    13:12
  • 50 - Questions 5160.mp4
    11:33
  • Description


    Cipher Modes, PKI, Tunnel, Transport

    What You'll Learn?


    • Understand Cryptography principles
    • PKI knowledge
    • Understanding Tunnel vs Transport
    • Understanding Cipher modes

    Who is this for?


  • Technology Learners
  • What You Need to Know?


  • None
  • More details


    Description

    This course on cryptography delves into the fundamental concepts of IT security, emphasizing the historical evolution of ciphers and modern cryptographic practices. It explores the origins and mechanics of classical encryption methods, such as the Caesar cipher, BIFID cipher, Playfair cipher, and Vigenère cipher, providing learners with foundational knowledge of symmetric encryption techniques. Understanding the importance of the CIA triad—Confidentiality, Integrity, and Availability—will be a core theme, underscoring security goals in cryptographic practices.

    Learners will study Public Key Infrastructure (PKI) and digital certificates, essential components of modern security, enabling secure communication and authentication. The course also covers tunneling and encapsulation protocols like Transport, Authentication Header (AH), Encapsulating Security Payload (ESP), and Internet Key Exchange (IKE), each providing critical insights into secure data transmission over networks.

    Moreover, the course introduces the concepts of cryptanalysis and crypto-cracking, giving students a glimpse into methods for decrypting information and examining the robustness of encryption. These practical insights allow learners to critically evaluate and understand encryption’s role in digital security, preparing them for advanced cryptographic concepts and applications in cybersecurity.

    The course equips students with practical skills in securing data and understanding vulnerabilities, laying a strong foundation for further exploration in cybersecurity fields, including encryption standards and advanced cryptographic applications.


    Who this course is for:

    • Technology Learners

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 52
    • duration 2:29:48
    • Release Date 2025/02/24